CN108874633B - WiFI label attribute display method, device and medium - Google Patents

WiFI label attribute display method, device and medium Download PDF

Info

Publication number
CN108874633B
CN108874633B CN201810529110.5A CN201810529110A CN108874633B CN 108874633 B CN108874633 B CN 108874633B CN 201810529110 A CN201810529110 A CN 201810529110A CN 108874633 B CN108874633 B CN 108874633B
Authority
CN
China
Prior art keywords
wifi
tag
identifier
attribute
hotspot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810529110.5A
Other languages
Chinese (zh)
Other versions
CN108874633A (en
Inventor
叶兆雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co ltd
Original Assignee
Shanghai Shangxiang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shangxiang Network Technology Co ltd filed Critical Shanghai Shangxiang Network Technology Co ltd
Priority to CN201810529110.5A priority Critical patent/CN108874633B/en
Publication of CN108874633A publication Critical patent/CN108874633A/en
Application granted granted Critical
Publication of CN108874633B publication Critical patent/CN108874633B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the specification discloses a WiFi tag attribute display method, equipment and a medium. After the user terminal obtains the available WiFi list in the surrounding environment, any available WiFi is obtained, based on the WiFi identifier, the tag attribute corresponding to the WiFi identifier is determined from the local or service end, and the tag attribute corresponding to each WiFi identifier is correspondingly displayed in the interface of the user terminal displaying the WiFi list, so that the user is guided to select WiFi according to the tag attribute, the success rate of the user in wireless connection and the network quality after connection are improved, and the user experience is improved.

Description

WiFI label attribute display method, device and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, and a medium for displaying WiFi tag attributes.
Background
In internet applications, electronic devices have become quite popular to connect to each other by WIreless-Fidelity (WiFI).
In the current technology, the user terminal may automatically detect a WiFi hotspot list in an active state around based on a native application carried by an operating system or an application provided by a third party. Each WIFI hotspot has a corresponding WIFI identifier, including a service set identifier (ServiceSet Identifier, SSID, generally, WIFI name) and a basic service set identifier (BasicServiceSetIdentifier, BSSID, generally, routing address). However, in the WiFi hotspot list provided by the native application or the third party, guidance on high quality (high success rate and high signal strength) hotspots is lacking, and the user does not know relevant information of each hotspot, so that the connection success rate is not high, and the user experience is general.
Based on this, a more convenient WiFi tag attribute presentation scheme is needed.
Disclosure of Invention
The embodiment of the specification provides a WiFi tag attribute display method, equipment and medium, which are used for solving the following problems: to provide a more convenient WiFi tag attribute presentation scheme.
Based on this, the embodiment of the present disclosure provides a WiFi tag attribute display method, including:
the method comprises the steps that a user terminal obtains a WiFi list, wherein the WiFi list comprises at least one WiFi identifier;
determining the corresponding tag attribute of any WiFi identifier;
in an interface for displaying the WiFi list, displaying the tag attribute corresponding to the WiFi identifier;
wherein the tag attribute comprises at least one of a security tag, a bandwidth tag, a security tag or a fee tag, and the security tag comprises an encryption hotspot, an operator hotspot or an open hotspot
Correspondingly, the embodiment of the specification also provides another WiFi tag attribute display method, including:
the server receives the WiFi identifier sent by the user terminal;
determining a tag parameter or a tag attribute corresponding to the WiFi identifier according to prestored WIFI state data containing the WiFi identifier;
the tag parameters or tag attributes are sent to the user terminal, so that the user terminal correspondingly displays the tag attributes of the WiFi identifier in an interface for displaying the WiFi list;
the tag parameters comprise at least one of security parameters, bandwidth parameters, security parameters or cost parameters, the security parameters comprise encryption hot spot parameters, operator hot spot parameters or open hot spot parameters, and the WIFI state data at least comprise corresponding relations of WiFi identifications, passwords, connection success rates and the number of simultaneous online devices.
The embodiment of the specification provides a WiFi tag attribute display device, the device including a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of any one of the above.
The present description embodiments provide a computer readable medium storing computer readable instructions executable by a processor to implement a method as described in any one of the above.
The above-mentioned at least one technical scheme that this description embodiment adopted can reach following beneficial effect:
after the user terminal obtains the available WiFi list in the surrounding environment, any one of the available WiFi is obtained, the tag attribute corresponding to the WiFi identifier is determined from the local or service end based on the WiFi identifier, and the tag attribute corresponding to each WiFi identifier is correspondingly displayed in the interface of the user terminal displaying the WiFi list, so that the user is guided to select WiFi according to the tag attribute, the success rate of the user in wireless connection and the network quality after connection are improved, and the user experience is improved.
Drawings
Fig. 1 is a schematic diagram involved in the present technical solution when a WiFI list is displayed;
fig. 2 is a flowchart of a WiFi tag attribute display method in a user side according to an embodiment of the present disclosure;
fig. 3a is a schematic diagram showing tag attributes corresponding to SSID of a user side according to an embodiment of the present disclosure;
fig. 3b is a schematic diagram of a user side according to the embodiment of the present disclosure for ordering a WiFi list according to tag attributes;
fig. 3c is a schematic diagram of a user side according to a further ordering of a WiFi list according to the embodiment of the present disclosure;
fig. 4 is a flowchart of a WiFi tag attribute display method in a server side according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a WiFi tag attribute display device in a user side according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a WiFi tag attribute display device in a service side according to an embodiment of the present disclosure.
Detailed Description
For the purposes, technical solutions and advantages of the present application, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present application based on the embodiments herein.
Fig. 1 is a schematic diagram involved in the present technical solution when a WiFI list is shown. The WiFi list is a list containing a plurality of available WiFi records, in general, each record only shows the name (i.e. SSID) of the wireless network or whether the wireless network is encrypted, and the signal strength is given by a corresponding sector antenna schematic diagram on the right side. It will be readily appreciated that in this case, if the user terminal detects multiple available WIFI alternatives, the user will often connect to some WIFI of low quality, requiring authentication or requiring a fee, since the user does not know the specific information of each available WIFI.
Based on this, the embodiment of the specification provides a WiFi tag attribute display scheme, which determines various tag attributes corresponding to each hotspot in the detected WiFi list according to the SSID thereof, so that the selection of a user is facilitated, and the user experience is improved.
The WiFi tag attribute display scheme provided by the embodiment of the specification comprises two aspects of a user terminal and a server. It should be noted that the user terminal may be a device with networking and presentation functions, such as a mobile phone, a tablet, a personal computer, a smart watch, etc. Meanwhile, the scheme provided by the embodiment of the specification can be realized through a system application (such as an IOS or an Android system-carried WiFi detection and management application) of the user terminal, or can be realized through an application provided by a third party, which does not limit the scheme.
As shown in fig. 2, fig. 2 is a flow chart of a WiFi tag attribute display method in a user side according to an embodiment of the present disclosure, including:
s201, the user terminal acquires a WiFi list, wherein the WiFi list comprises at least one WiFi identifier.
The manner in which the user terminal obtains the surrounding WiFi list is well established at present, and will not be described in detail here. The WiFi identification comprises a service set identification (ServiceSetIdentifier, SSID) and a BSSID. It will be readily appreciated that in the resulting WiFi list, the SSID is typically shown to correspond to an available wireless hotspot in an active state for selection by the user. The SSID and the BSSID (generally, a routing address) have a corresponding relationship, and the BSSID may be displayed although it belongs to a hidden state.
In addition, after the user selects the connection hotspot, the user terminal can also send information such as the WiFi identifier of the connection, the connection state (whether successful) and the password (if successful) to the server after each connection, so that the server can construct corresponding WiFi state data to perform statistics. Or the user terminal can also store own connection record locally so as to count by oneself.
S203, determining the label attribute corresponding to any WiFi identifier.
Specifically, the tag attribute may include at least one of a security tag (for declaring whether the WiFi identifier is secure, a bandwidth tag (for declaring a bandwidth state of the WiFi identifier), a security tag (for declaring an openness degree of the WiFi identifier), or a fee tag (for declaring whether the WiFi identifier needs to be charged), where the security tag includes an encryption hotspot (for declaring that the WiFi identifier needs a password, and the password may be obtained from a server or locally), an operator hotspot (for declaring that the WiFi identifier belongs to each operator and does not need a password), or an open hotspot (for declaring that the WiFi identifier does not belong to each operator and does not need a password), and the operator hotspot may depend on the region where the WiFi identifier is located. The various labels can be used for identifying the WiFi labels to determine the attribute, so that a user can conveniently select the WiFi labels based on the user's own needs.
The manner of determining the tag attribute corresponding to the WiFi identifier can be obtained directly or indirectly from a server side, or can be determined from local historical data.
S205, in an interface for displaying the WiFi list, displaying the tag attribute corresponding to the WiFi identifier.
At the interface where the WiFi list is presented, each WiFi identification is typically presented in a plurality of rows. Each WiFi identifier in the list is provided with a corresponding blank, and the corresponding label attribute of each WiFi identifier can be displayed in the blank corresponding to the WiFi identifier. Of course, the corresponding fee label may be displayed directly above or directly below the WiFi identifier in other manners, for example, and the bandwidth label of the WiFi identifier is displayed at 78M on the right side of the sector antenna diagram corresponding to the WiFi identifier. As shown in fig. 3a, fig. 3a is a schematic diagram showing tag attributes corresponding to the SSID of the user side according to the embodiment of the present disclosure.
As a specific embodiment, for any SSID in step S203, determining the tag attribute corresponding to the SSID includes the following manners: the WiFi identifier is sent to a server, the tag attribute returned by the server is received, and the received tag attribute is determined to be the tag attribute corresponding to the WiFi identifier; or, sending the WiFi identifier to a server, receiving the tag parameter returned by the server, and confirming the tag attribute corresponding to the WiFi identifier based on the corresponding relation between the preset tag parameter and the tag attribute; or acquiring the tag attribute corresponding to the WiFi identifier according to the WiFi identifier and locally pre-stored tag attribute data, wherein the tag attribute data comprises the corresponding relation between the WiFi identifier and the tag attribute.
Specifically, because the SSID may be the same name (for example, a hotspot in Jiangsu and a hotspot in Beijing may be "hungmenji"), the BSSID is generally a MAC (MediaAccess Control or medium access control) address, and sending the SSID and the BSSID is beneficial for the server to further accurately distinguish tag attributes corresponding to the same SSID according to the address.
And the user terminal sends the SSID and the corresponding BSSID contained in the acquired WiFi list to the server, so that the server can determine the tag attribute of each WiFi identifier by using historical data or real-time data, and then receive the returned tag attribute. Or receiving the label parameter returned by the server, wherein the label parameter can be in various forms such as numbers, letters or character strings, and the label parameter only needs to have a preset corresponding relation with the label attribute. For example, the correspondence is (1, encryption hotspot), (2, open hotspot), (3, operator hotspot), and so on. Based on the above relation, if the label parameter returned by the receiving server is "1", the corresponding label attribute is determined to be "encryption hotspot".
As mentioned above, the ue may also store the corresponding connection data locally after each connection. Thus, in another mode, the user terminal may perform statistics or calculation according to the connection data stored in the local, determine the tag attribute of the WiFi identifier that has been connected locally, and generate tag attribute data including the WiFi identifier and the tag attribute that have been connected (for example, construct a state relationship table including SSID and tag attribute). For example, if the user does not need to cryptographically connect a hotspot with an SSID of "tplink301" multiple times, the local may construct the following correspondence (tplink 301, open hotspot) based on the above data, so that the tag attribute of "tplink301" may be determined to include "open hotspot" locally.
In practical application, for better guiding users to select hot spots, the WiFi identifiers in the WiFi list can be ordered according to the tag attributes, so that user experience is improved. The specific ordering may be according to actual needs. For example, if the user desires to obtain a faster WiFi hotspot, the user may sort according to the bandwidth tag, and sort the WiFi hotspot with a larger bandwidth before other hotspots; if the user hopes to obtain safer WiFi hotspots, the WiFi hotspots with the corresponding tag attribute of "encrypted hotspots" can be ranked according to the secret security tags, and the corresponding WiFi hotspots with the secret security tags of "operator hotspots" or "open hotspots" are ranked before the WiFi identifiers, or the "encrypted hotspots" are directly determined to be ranked before all other WiFi hotspots. As shown in fig. 3b, fig. 3b is a schematic diagram of the user side according to the embodiment of the present disclosure ordering the WiFi list according to the tag attribute.
Further, after the WiFi list is ranked according to the tag attribute, internal ranking may also be performed between WiFi hotspots with the same tag attribute according to other ranking parameters. For example, for WiFi identifications with tag attributes having "encryption hotspots", the tag attributes may be sorted according to the number of historic connections, the historic connection success rate (the historic connection success rate may be the historic connection success rate of the local user terminal only, or the historic connection success rate including other terminals), or the signal strength. Namely, firstly, the history connection times are placed at the end of 0, then the history connection success rate is further ordered according to the history connection success rate, the history connection success rate is placed in the front, and finally the signal strength is placed in the front according to the signal strength ordering.
It is easy to understand that in the process of further sorting, the specific selection of each sorting parameter and the sorting mode can be determined according to actual needs. For example, all the "encryption hotspots" may be further ordered according to the "number of historic connections" and then according to the "signal strength", or may be further ordered according to the "signal strength" and then according to the "number of historic connections". It will be readily appreciated that the order of inclusion of the WiFi identifications between the different tag attributes is not affected in the further ordering process. As shown in fig. 3c, fig. 3c is a logic schematic diagram of further ordering the WiFi list according to the ordering parameters by the user side according to the embodiment of the present disclosure.
In practical applications, one WiFi identifier may have multiple tag attributes, and the display interface is limited, so that the display can be performed based on the following manner: and displaying the label attributes corresponding to the WiFi identifiers with the specified number of the labels sequenced in the front according to the preset label state sequence.
The label attribute sequence can be a predetermined sequence number, or a corresponding display weight is given to each label attribute, and preferential display with high weight is performed. The specified number may be based on practical experience. For example, the presentation order of the tag attributes is determined in advance as "security tag, fee tag, security tag, bandwidth tag", and two tag attributes are specified to be presented. If it is determined that the current tag attribute of one WiFi identifier is "open hot spot, free, safe and 10M", only "open hot spot" and "free" are displayed.
In practical applications, the label attribute may be displayed in text form (including various natural language text, numbers, etc.), or in graphics form, for example, a designated graphic (e.g., triangle in fig. 3 a) represents "unsafe" and the graphic is displayed to alert the user.
The above describes the execution flow of the user terminal in the solution provided by the embodiment of the present disclosure, and for the aspect of the service terminal, as shown in fig. 4, fig. 4 is a flow diagram of a WiFi tag attribute display method for the aspect of the service terminal provided by the embodiment of the present disclosure, where the flow diagram includes:
s401, the server receives a WiFi identifier sent by the user terminal;
s403, determining a label parameter or a label attribute corresponding to the WiFi identifier according to pre-stored WIFI state data containing the WiFi identifier; the tag attribute includes at least one of a security tag, a bandwidth tag, a security tag or a cost tag, the security tag includes an encryption hotspot (the encryption hotspot is a hotspot requiring a password and the server determines that the password can be provided), an operator hotspot or an open hotspot, and the WIFI status data at least includes a corresponding relationship between a WIFI identifier, a password, a connection success rate and the number of online devices at the same time. At the same time, it can also include other data such as charging condition, security condition and bandwidth information of the hot spot based on user feedback or other modes such as server collection
The tag attributes have been described above and will not be described in detail here. Tag parameters the tag parameters include at least one of security parameters, bandwidth parameters, security parameters, or cost parameters, the security parameters include encryption hotspot parameters, operator hotspot parameters, or open hotspot parameters. In other words, a tag parameter is a set of parameters that corresponds one-to-one to a tag attribute, which may be in the form of a number, letter, or other string, for example, (1, encryption hotspot), (2, no encryption hotspot), (5, charge), (8, secure), (9, unsafe), etc. When receiving the tag parameters, the user terminal can determine the tag attributes based on the preset corresponding relation.
As described above, the WIFI status data may be constructed based on data sent by the user terminal after connection, may be obtained based on various data submitted by the user from other channels, and may be obtained based on real-time data statistics during a certain time.
For example, when more than a certain number of users reflect that the WiFi identifier is unsafe, the corresponding security tag is determined to be unsafe, or the tag parameter is determined to be 8; the user can obtain the bandwidth information of the WiFi identifier when in connection, and the bandwidth label can be obtained based on statistics of bandwidth data sent by a plurality of users in a certain time; the cost tag or cost parameter may also be derived based on user feedback. Specifically, whether the tag parameters or the tag attributes are sent can be determined automatically according to actual needs.
And S405, the tag parameters or tag attributes are sent to the user terminal, so that the user terminal correspondingly displays the tag attributes of the WiFi identifier in an interface for displaying the WiFi identifier.
In the above scheme provided by the embodiment of the present disclosure, after the user terminal obtains the available WiFi list in the surrounding environment, for any available hotspot, based on its WiFi identifier, the tag attribute corresponding to the WiFi identifier is determined from the local or server, and the tag attribute corresponding to each WiFi identifier is correspondingly displayed in the interface where the user terminal displays the WiFi list, so as to guide the user to select WiFi according to the tag attribute, and improve the success rate of the user when performing wireless connection and the network quality after connection, thereby improving the user experience.
As a specific embodiment, for the security tag, the following manner may be included: if the WIFI status data includes a corresponding password (i.e., the server may provide the password to the client in various plaintext or ciphertext manners, so that the client may connect with the corresponding WIFI identifier through the password), and determine that the secret security parameter corresponding to the WIFI identifier is an encryption hotspot parameter; otherwise, determining the secret and secure parameters corresponding to the WiFi identifier as unencrypted hotspot parameters, wherein the unencrypted hotspot parameters comprise operator hotspot parameters or open hotspot parameters.
For any unencrypted hotspot, as a common way, it may be confirmed whether it is an operator hotspot or an open hotspot based on the name of the WiFi identification (i.e., SSID). For example, the server provides a list of operator names, and any SSID name in the list is considered as an operator hotspot, otherwise, the service end confirms that the service end is an open hotspot.
Further, for the unencrypted hotspot in the above scheme, if the number of simultaneous online devices corresponding to the WIFI identifier and the connection success rate meet preset conditions in the WIFI status data, determining that the secret and security parameter corresponding to the WIFI identifier is an operator hotspot parameter; otherwise, determining the secret parameters corresponding to the WiFi identifier as open hot spot parameters.
For example, for all unencrypted hotspots, the preset condition may be that the number of online devices for the WiFi identity is more than twice that for all WiFi identities at the same time, and the historical connection success rate is less than 1/2 of that for all WiFi identities. Or, for another example, the preset condition may be that the number of online devices simultaneously identified by the WiFi identifier exceeds 100, and the historical connection success rate is lower than 40%. It is easy to understand that "twice", "1/2", "100", and "40%" among the above-mentioned preset conditions can be set by themselves based on experience and actual situations. And if the preset condition is met, determining that the secret and secure label of the WiFi identifier is an 'operator hot spot', otherwise, determining that the secret and secure label of the WiFi identifier is an 'open hot spot'. The user can select a wireless network with higher quality by distinguishing the 'operator hot spot' from the 'open hot spot', so that the user experience is further improved.
Based on the same concept, the embodiment of the present disclosure further provides a device for displaying WiFi tag attribute on a user side, as shown in fig. 5, where the structural schematic diagram of the device for displaying WiFi tag attribute on a user side provided in the embodiment of the present disclosure in fig. 5 includes:
the acquiring module 501 is configured to acquire a WiFi list from a user terminal, where the WiFi list includes at least one WiFi identifier;
a determining module 503, configured to determine, for any one of the WiFi identifiers, a tag attribute corresponding to the WiFi identifier;
the display module 505 displays the tag attribute corresponding to the WiFi identifier in an interface for displaying the WiFi list;
the tag attribute comprises at least one of a security tag, a bandwidth tag, a security tag or a cost tag, and the security tag comprises an encryption hot spot, an operator hot spot or an open hot spot.
Further, the device further includes a sending module 507, configured to send the WiFi identifier to a server, receive a tag attribute returned by the server, and determine that the received tag attribute is a tag attribute corresponding to the WiFi identifier; or, sending the WiFi identifier to a server, receiving the tag parameter returned by the server, and confirming the tag attribute corresponding to the WiFi identifier based on the corresponding relation between the preset tag parameter and the tag attribute; or, the obtaining module 501 obtains the tag attribute corresponding to the WiFi identifier according to the WiFi identifier and locally pre-stored tag attribute data, where the tag attribute data includes a correspondence between the WiFi identifier and the tag attribute.
Further, the apparatus further includes a ranking module 509, configured to rank the WiFi identifications in the WiFi list according to the tag attribute corresponding to each WiFi identification.
Further, the sorting module 509 sorts, in the WiFi list, the WiFi identifications corresponding to the WiFi identifications, and before the WiFi identifications corresponding to the WiFi identifications with the WiFi identifications as the encrypted hotspots, the WiFi identifications corresponding to the WiFi identifications with the WiFi identifications as the operator hotspots or the open hotspots.
Further, the ranking module 509 ranks the plurality of WiFi identifiers with the same security tag according to a preset ranking parameter, where the preset ranking parameter includes at least one of a historical connection number, a historical connection success rate, or a signal strength.
Further, when the obtained tag attributes are determined to be multiple, the display module 505 displays, according to a preset tag status sequence, a specified number of tag attributes corresponding to the WiFi identifications ranked in front.
Further, the display module 505 displays the tag attribute corresponding to the WiFi identifier in text or graphics.
Based on the same concept, the embodiment of the present disclosure further provides a device for displaying WiFi tag attribute on a server side, as shown in fig. 6, where fig. 6 is a schematic structural diagram of the device for displaying WiFi tag attribute on a server side according to the embodiment of the present disclosure, and includes:
the receiving module 601 receives the WiFi identifier sent by the user terminal from the server side;
the determining module 603 determines a tag parameter or a tag attribute corresponding to the WiFi identifier according to pre-stored WiFi state data including the WiFi identifier;
the sending module 605 sends the tag parameter or the tag attribute to the user terminal, so that the user terminal correspondingly displays the tag attribute of the WiFi identifier in an interface for displaying a WiFi list;
the tag parameters comprise at least one of security parameters, bandwidth parameters, security parameters or cost parameters, the security parameters comprise encryption hot spot parameters, operator hot spot parameters or open hot spot parameters, and the WIFI state data at least comprise corresponding relations of WiFi identifications, passwords, connection success rates and the number of simultaneous online devices.
Further, the determining module 603 determines that the secret parameters corresponding to the WIFI identifier are encryption hotspot parameters if the WIFI identifier has a corresponding password in the WIFI status data; otherwise, determining the secret and secure parameters corresponding to the WiFi identifier as unencrypted hotspot parameters, wherein the unencrypted hotspot parameters comprise operator hotspot parameters or open hotspot parameters.
Further, the determining module 603 determines, if in the WIFI status data, the number of simultaneous online devices corresponding to the WIFI identifier and the connection success rate meet preset conditions, and determines that the security parameter corresponding to the WIFI identifier is an operator hotspot parameter; otherwise, determining the secret parameters corresponding to the WiFi identifier as open hot spot parameters.
Embodiments of the present disclosure also provide a WiFi tag attribute display device, the device including a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of any one of the preceding claims.
Correspondingly, the embodiment of the application also provides a computer readable medium, wherein the medium stores computer readable instructions, and the computer readable instructions can be executed by a processor to realize the method of any one of the above.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the apparatus, device and medium embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and the relevant parts will be referred to in the description of the method embodiments, which is not repeated herein.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps or modules recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a Programmable logic device (Programmable LogicDevice, PLD), such as a field Programmable gate array (FieldProgrammableGateArray, FPGA), is an integrated circuit whose logic function is determined by the programming of the device by a user. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (HardwareDescription Language, HDL), but HDL is not just one, but a plurality of kinds, such as ABEL (Advanced BooleanExpressionLanguage), AHDL (AlteraHardwareDescriptionLanguage), confluence, CUPL (cornellunignyiProgrammingLangage), HDcal, jHDL (javahard script language), lava, lola, myHDL, PALASM, RHDL (rubyHardwareDescriptionLangLange) and the like, and VHDL (Very-High-speededdie hard script DescriptionLange) and Verilog are most commonly used at present. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (application specific IntegratedCircuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of controllers include, but are not limited to, the following microcontrollers: ARC625D, atmelAT91SAM, microchip PIC18F26K20, and silicalabsc 8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of the units may be implemented in the same one or more pieces of software and/or hardware when implementing the embodiments of the present specification.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash memory (flashRAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. The computer-readable medium, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signal numbers and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be apparent to one of ordinary skill in the art that one or more embodiments in the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present specification may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Moreover, embodiments of the present description may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular transactions or implement particular abstract data types. Embodiments of the present description may also be practiced in distributed computing environments where transactions are performed by remote processing devices that are connected through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.

Claims (12)

1. The WiFi label attribute display method is characterized by comprising the following steps of:
the method comprises the steps that a user terminal obtains a WiFi list, wherein the WiFi list comprises at least one WiFi identifier;
determining the corresponding tag attribute of any WiFi identifier;
the tag attribute comprises at least one of a security tag, a bandwidth tag, a security tag or a cost tag, wherein the security tag comprises an encryption hot spot, an operator hot spot or an open hot spot; the security tag is determined according to at least one of password information corresponding to the WiFi identifier, the number of on-line equipment and the connection success rate; the encryption hotspots are used for declaring that the WiFi hotspots corresponding to the WiFi identifications need passwords and can acquire the passwords from a server or locally, the operator hotspots are used for declaring that the WiFi hotspots corresponding to the WiFi identifications are provided by operators and do not need passwords, and the open hotspots are used for declaring that the WiFi hotspots corresponding to the WiFi identifications are not hotspots provided by operators and do not need passwords; the label attribute corresponding to the WiFi identifier is a label attribute obtained from a server or a label attribute determined from local historical data;
ordering the WiFi identifications with the corresponding secret labels as the encrypted hotspots before the WiFi identifications with the corresponding secret labels as the operator hotspots, and ordering the WiFi identifications with the corresponding secret labels as the operator hotspots before the WiFi identifications with the corresponding secret labels as the open hotspots;
sorting a plurality of WiFi identifiers with the same security tag in the WiFi list according to a preset sorting parameter, wherein the preset sorting parameter comprises at least one of historical connection times and historical connection success rate;
and displaying the label attribute corresponding to the ranked WiFi identifier in an interface for displaying the WiFi list.
2. The method of claim 1, wherein determining, for any of the WiFi identifications, a tag attribute corresponding thereto comprises:
the WiFi identifier is sent to a server, the tag attribute returned by the server is received, and the received tag attribute is determined to be the tag attribute corresponding to the WiFi identifier; or alternatively, the process may be performed,
the WiFi identifier is sent to a server, tag parameters returned by the server are received, and the tag attribute corresponding to the WiFi identifier is confirmed based on the corresponding relation between the preset tag parameters and the tag attribute; or alternatively, the process may be performed,
and acquiring the tag attribute corresponding to the WiFi identifier according to the WiFi identifier and locally pre-stored tag attribute data, wherein the tag attribute data comprises the corresponding relation between the WiFi identifier and the tag attribute.
3. The method as recited in claim 1, further comprising:
and ordering the WiFi identifiers in the WiFi list according to the tag attributes corresponding to the WiFi identifiers.
4. The method of claim 3, wherein ranking WiFi identifications in the WiFi list according to tag attributes corresponding to the respective WiFi identifications, comprises:
and in the WiFi list, confirming the corresponding secret security tags of the WiFI identifiers, and sequencing the WiFi identifiers with the corresponding secret security tags as encryption hotspots before the WiFi identifiers with the corresponding secret security tags as operator hotspots or open hotspots.
5. The method of claim 3, wherein if the plurality of WiFi identifications have the same security tag, further comprising:
and sequencing the plurality of WiFi identifiers with the same security tag according to a preset sequencing parameter, wherein the preset sequencing parameter comprises at least one of historical connection times, historical connection success rate or signal strength.
6. The method of claim 1, when the obtained tag attributes are determined to be a plurality of, wherein displaying the tag attributes corresponding to the WiFi identifier comprises:
and displaying the label attributes corresponding to the WiFi identifiers with the specified number and the previous ordering according to the preset label attribute sequence.
7. The method of claim 1, wherein displaying the tag attribute corresponding to the WiFi identification comprises:
and displaying the tag attribute corresponding to the WiFi identifier in the form of text or graphics.
8. The WiFi label attribute display method is characterized by comprising the following steps of:
the server receives the WiFi identifier sent by the user terminal;
determining a tag parameter or a tag attribute corresponding to the WiFi identifier according to prestored WIFI state data containing the WiFi identifier;
the tag parameters or the tag attributes are sent to the user terminal, so that the user terminal can sort the WiFi identifiers with the corresponding secret security tags as encryption hotspots before the WiFi identifiers with the corresponding secret security tags as operator hotspots, sort the WiFi identifiers with the corresponding secret security tags as the operator hotspots before the WiFi identifiers with the corresponding secret security tags as open hotspots, sort the WiFi identifiers with the same secret security tags in a WiFi list according to preset sorting parameters, and then correspondingly display the tag attributes of the sorted WiFi identifiers in an interface of the WiFi list; the preset ordering parameters comprise at least one of historical connection times and historical connection success rate;
the tag parameter comprises at least one of a security parameter, a bandwidth parameter, the secret security parameter or a cost parameter, and the secret security parameter comprises the encryption hotspot parameter, the operator hotspot parameter or the open hotspot parameter, wherein the encryption hotspot is used for declaring that a WiFi hotspot corresponding to the WiFi identifier needs a password and can acquire the password from a server or locally, the operator hotspot is used for declaring that the WiFi hotspot corresponding to the WiFi identifier is provided by an operator and does not need the password, and the open hotspot is used for declaring that the WiFi hotspot corresponding to the WiFi identifier is not provided by the operator and does not need the password; the WIFI state data at least comprises corresponding relations of WiFi identifications, password information, equipment historical connection success rates and the number of the online equipment at the same time; the secret protection parameters are determined according to at least one of password information corresponding to the WiFi identifier, the number of on-line equipment and the connection success rate;
the tag attribute corresponding to the WiFi identifier is a tag attribute obtained from a server or a tag attribute determined from local historical data.
9. The method of claim 8, wherein determining the tag parameter corresponding to the WiFi identifier according to pre-stored WiFi status data including the WiFi identifier comprises:
if the WiFi identifier has a corresponding password in the WIFI state data, determining that the secret protection parameter corresponding to the WiFi identifier is an encryption hotspot parameter;
otherwise, determining the secret and secure parameters corresponding to the WiFi identifier as unencrypted hotspot parameters, wherein the unencrypted hotspot parameters comprise operator hotspot parameters or open hotspot parameters.
10. The method of claim 9, wherein determining that the security parameter corresponding to the WiFi identifier is a non-encrypted hotspot parameter comprises:
if the number of the simultaneous online devices corresponding to the WiFi identifier and the connection success rate meet preset conditions in the WIFI state data, determining that the security parameters corresponding to the WiFi identifier are operator hot spot parameters;
otherwise, determining the secret parameters corresponding to the WiFi identifier as open hot spot parameters.
11. A WiFi tag attribute presentation device comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of any one of claims 1 to 10.
12. A computer readable medium storing computer readable instructions executable by a processor to implement the method of any one of claims 1 to 10.
CN201810529110.5A 2018-05-29 2018-05-29 WiFI label attribute display method, device and medium Active CN108874633B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810529110.5A CN108874633B (en) 2018-05-29 2018-05-29 WiFI label attribute display method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810529110.5A CN108874633B (en) 2018-05-29 2018-05-29 WiFI label attribute display method, device and medium

Publications (2)

Publication Number Publication Date
CN108874633A CN108874633A (en) 2018-11-23
CN108874633B true CN108874633B (en) 2023-06-02

Family

ID=64335423

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810529110.5A Active CN108874633B (en) 2018-05-29 2018-05-29 WiFI label attribute display method, device and medium

Country Status (1)

Country Link
CN (1) CN108874633B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110611894B (en) * 2019-09-17 2023-08-15 上海尚往网络科技有限公司 Method for setting hot spot at user terminal, service terminal and route terminal
CN112040529B (en) * 2020-09-11 2023-08-04 连尚(北京)网络科技有限公司 WiFi connection method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202797A (en) * 2014-09-25 2014-12-10 珠海市君天电子科技有限公司 WiFi list displaying method and device
CN107371153A (en) * 2017-06-26 2017-11-21 中广热点云科技有限公司 A kind of method for identifying WIFI hot spot service

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8793400B2 (en) * 2009-12-30 2014-07-29 Verizon Patent And Licensing Inc. Management of inter-provider peer-to-peer based feature network
CN104504002A (en) * 2014-12-09 2015-04-08 北京极科极客科技有限公司 Intelligent sequencing method of WiFi (Wireless Fidelity) list
CN105873237A (en) * 2015-08-05 2016-08-17 上海连尚网络科技有限公司 Method and device for building wireless connection
CN105636170A (en) * 2015-12-25 2016-06-01 深圳Tcl数字技术有限公司 Wireless hotspot scanning and displaying method and device
CN105682015B (en) * 2016-04-05 2017-10-31 上海连尚网络科技有限公司 A kind of method and apparatus for being used to set up wireless connection
CN107949019B (en) * 2017-10-24 2021-09-21 上海连尚网络科技有限公司 Load balancing method of wireless access point

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202797A (en) * 2014-09-25 2014-12-10 珠海市君天电子科技有限公司 WiFi list displaying method and device
CN107371153A (en) * 2017-06-26 2017-11-21 中广热点云科技有限公司 A kind of method for identifying WIFI hot spot service

Also Published As

Publication number Publication date
CN108874633A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
US10299197B2 (en) Wireless fidelity connection method, mobile terminal and storage medium
US20180041893A1 (en) Method and system of multi-terminal mapping to a virtual sim card
US20200057550A1 (en) Method and apparatus for generating customized visualization component
CN106411517B (en) A kind of password remapping method and device
CN108990059B (en) Verification method and device
CN107026832A (en) Account logon method, equipment and server
CN104992120A (en) Picture encryption method and mobile terminal
CN110191154B (en) User tag determination method and device
CN104346560A (en) Security authentication method and security authentication device
CN106612226B (en) Instant messaging message processing method and device
CN108874633B (en) WiFI label attribute display method, device and medium
CN108400902A (en) A kind of method, apparatus and equipment of gray scale test
US10728223B2 (en) WI-FI connection method, mobile terminal and storage medium
CN107689984B (en) Message pushing method and device, computer equipment and storage medium
CN116361755A (en) Application program login verification method, device, equipment and storage medium
CN108550033A (en) A kind of method and device of display Digital Object Unique Identifier
KR102151900B1 (en) Identification method and apparatus
CN106713637A (en) Method and device for establishing call item
CN106445479A (en) Information pushing method and apparatus
CN108062401A (en) Using recommendation method, apparatus and storage medium
CN108512803A (en) Remind the method and device of change account bound phone number
CN106793016B (en) Wireless fidelity Wi-Fi connection method and mobile terminal
CN108667647B (en) Method and device for setting device parameters and server
CN112866085B (en) Resource transmission method and device
CN107483534B (en) Service processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210419

Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 312599 B-2, 3 floor, Jiayi Plaza, 127 East Renmin Road, Nanming street, Xinchang, Shaoxing, Zhejiang

Applicant before: LIANSHANG (XINCHANG) NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant